[Ta Vinh Thong]
    Dr. Vinh-Thong TA, PhD.
    (Tien si cong nghe thong tin)

    Address: 56 Boulevard Niels Bohr, 69100 Villeurbanne, France
    Office: 8, 3rd floor
    E-mails: thong (*) crysys.hu       (primary, permanent email)
                 vinh-thong.ta (*) inria.fr





Short biography:

Vinh-Thong TA was born in 1983 in Hanoi, the capital city of Vietnam. He came to Hungary when he was 9 ages old in 1992. He received the MSc degree in 2008 in computer science from the Budapest University of Technology and Economics (BUTE). He earned the PhD degree in 2014 in IT security from the Budapest University of Technology and Economics (BUTE), at the Laboratory of Cryptography and System Security (CrySyS Lab), under the supervision of Dr. Levente Buttyán. Since Feb. 2014 he works as postdoctoral researcher at Institut national de recherche en informatique et en automatique (INRIA) in Lyon, in the group of Dr. Daniel Le Métayer. At INRIA he investigates possible solutions for privacy by design and accountability problems.

Educations:


International courses :


Professional Career:


Research activities


Publications

Conferences and Journals

[1] L. Buttyán, Ta Vinh Thong, Biztonsági API analízis a spi-kalkulussal, Hiradástechnika, Volume LXIII. , number 8, 2007, 16–21. (PDF

[2] L. Buttyán, Ta Vinh Thong, Security API analysis with the spi-calculus, Hiradástechnika, Volume LXII. , number 1, 2008, 43–49. (PDF

[3] L. Buttyán, G. Pék, Ta Vinh Thong, Consistency verification of stateful firewalls is not harder than the stateless case, Infocommunications Journal, Volume LXIV., number 2009/2-3., 2–3, 2009 (PDF)

[4] L. Buttyán, Ta Vinh Thong, Formal verification of secure ad-hoc network routing protocols using deductive model-checking, IFIP Wireless and Mobile Networking Conference (WMNC’2010). (PDF)

[5] F. Kargl, P. Papadimitratos, L. Buttyan, M. Mueter, E. Schoch, B. Wiedersheim, Ta Vinh Thong, G. Calandriello, A. Held, A. Kung, J.-P. Hubaux, Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges, IEEE Communications Magazine, Volume 46, number 11, 2008 november (PDF)

[6] L. Buttyán, Ta Vinh Thong, Formal verification of secure ad-hoc network routing protocols., Periodica Polytechnica Electrical Engineering Journal, 2011 (To appear)

[7] Ta Vinh Thong, L. Buttyán. On automating the verification of secure ad-hoc network routing protocols, Telecommunication Systems Journal, Springer, 2011 (LINK)

[8] Ta Vinh Thong, Levente Buttyán, Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases. 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus) 2012. (LINK)

[9] Amit Dvir, Levente Buttyán, Ta Vinh Thong SDTP+: Securing a Distributed Transport Protocol for WSNs using Merkle Trees and Hash Chains. IEEE ICC 2013 - Communication and Information Systems Security Symposium.

[10] Ta Vinh Thong, Amit Dvir, Levente Buttyán On automatic security verification of WSN transport protocols. ISRN Sensor Networks Journal, Hindawi., id:891467, 2014, (In Press)

[11] Ta Vinh Thong, Amit Dvir, Levente Buttyán Formal Security Verification of Transport Protocols for Wireless Sensor Networks. In proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA) 2014. pp 389-403.

[12] Ta Vinh Thong, Thibaud Antignac. Privacy By Design: On the Conformance Between Protocols and Architectures. The 7th International Symposium on Foundations & Practice of Security FPS'2014, Montreal, Canada, November 3-5, 2014.

Technical Reports

[T1] Ta Vinh Thong, Biztonsági API-k formális analizise a spi-kalkulussal. 2007, TDK, BME VIK.

[T2] Ta Vinh Thong, Security API analysis with the spi-calculus and the ProVerif tool. 2008, CrySyS Lab., BME. (PDF)

[T3] Ta Vinh Thong, Levente Buttyán, Formal Verification of the SeVeCom HSM API with the applied pi-calculus and the ProVerif tool. 2009, CrySyS Lab., BME. (PDF)

[T4] Ta Vinh Thong, Formal verification of secure ad-hoc network routing protocols using deductive model-checking. 2012, CrySyS Lab., BME. (PDF, at IACR Cryptology ePrint Archive )

[T5] Ta Vinh Thong, Levente Buttyán, Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases. 2012, CrySyS Lab., BME. (PDF)

[T6]  Amit Dvir, Levente Buttyán, Ta Vinh Thong, A Secure Distributed Transport Protocol for Wireless Sensor Networks. 2012, CrySyS Lab., BME.

[T7]  Ta Vinh Thong, Amit Dvir . On automatic security verification of WSN transport protocols 2013, CrySyS Lab., BME. (PDF, at IACR Cryptology ePrint Archive)


Projects


Teaching activities:


Supervised student projects:


Conference organizations (took part in):


Reviewer activities:


Memberships:


Prizes/Scholarship


Languages :


Hobbys:


Back